Secure Software
AWR178 – 9.00 Hours
Schedule
Details Buttons | Dates | Location | Class | Price | Register Buttons |
---|---|---|---|---|---|
11/01/24 – 05/31/25 | College Station, TX | EC AWR178 157 | Register |
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.
Course Description
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
As part of a Department of Homeland Security/Federal Emergency Management Agency (DHS/FEMA) cooperative agreement training program, this course is available at no direct cost to state, county, and local government agencies.
Prerequisites
There are no prerequisites for this course.
Enrollment Requirements
Participants must be U.S. citizens. A FEMA Student ID is required to register for and participate in any training provided by FEMA agencies. All FEMA training providers, registration systems, and enrollment procedures are required to use this FEMA SID, which can be obtained at the following website: https://cdp.dhs.gov/femasid;or with TEEX assistance upon arrival for class.
Course Completion Requirements
Participants are required to complete all course content and score a 70% or better on the Post-Test in order to receive a course certificate of completion.
Attendance Requirements
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
Recommended
Broadband connection recommended.
Upon successful completion, you will be able to:
- Recognize fundamental concepts of developing secure software.
- Identify the need for secure software design and explain how these techniques are used to create more robust and reliable software.
- Identify secure programming methods for mobile devices.
- Identify commonly used secure software development methodologies.
Suggested Audience
Software developers and IT staff interested in furthering their knowledge regarding the development of secure software.
Continuing Education And Professional Credits
- 2.00 hours – American Council on Education (ACE)
- State Board for Educator Certification (SBEC)/Texas Education Agency (TEA)
Other Information
In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
Government Programs
- For DHS/FEMA Funded Courses, please contact [email protected] or call (800) 541-7149
Contact Information
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]